Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts in English
Straners | 02 Jul 2013 | 0 comments

What every business wants and strives for is IT Service Availability at lower cost. But how you achieve this is a challenge that really concentrates the mind. Moving forward, a triple alliance between Physical, Virtual and Cloud will be the route that most organisations choose to deliver against their availability goals. The big test is deciding which service you should put into what ‘bucket’ of this alliance.

Let’s start off by thinking about business-critical services. These require availability and protection at all times, regardless of whether they reside on a physical server, a virtual machine or potentially both. It is easy to create new virtual machines; it’s not so easy to manage them when too many are generated. On top of that, what are the aggregated server management costs? While the lure of life in the Cloud will supposedly remove capital investment, who actually pays the ‘Cloud bill’ at the end of the month? Getting the...

Sian John | 17 Jun 2013 | 0 comments

Should security-conscious businesses be running applications in the cloud? In addition to frequently cited concerns (data sovereignty, management console points of failure and so on), the nature of cloud models has a number of architectural, and therefore security implications.
 
Cloud-based applications are by their nature distributed, benefiting from elastic infrastructure (processing, memory and storage) which can be scaled according to demand. Applications built for the cloud are increasingly architected based on the principle that hardware failure may (and sometimes does (http://www.policymic.com/articles/10526/amazon-crash-causes-instagram-and-netflix-to-blackout-is-cloud-computing-ready-for-prime-time)) happen.
 
From...

bjornengelhardt | 29 May 2013 | 0 comments

by Bjorn Engelhardt, VP, Strategic Sales & Cloud – Asia Pacific and Japan, Symantec

Recently, myself and our new Symantec AR manager for APJ, Sancharini Mazumdar, ‘met’ online with a number of our key regional analysts to offer some insights into Symantec’s latest announcements and provide an update on the ‘Symantec Vision 2013’ for the region. Much of this vision is about solving customers’ largest unmet and under-served needs, while reducing complexity and increasing simplification.

This is all very much part of the revolution taking place within Symantec right now, the core of which is based on delivering more value for our customers – whether they be consumers, small businesses, large enterprises or countries all around the world. What will this revolution be based on? Most importantly, the goal of better meeting customer needs through internal innovation and driving faster organic growth. And it’...

Straners | 21 May 2013 | 0 comments

HOW TO AVOID THE DARK CLOUDS

 

It isn’t hard to see why Cloud-Based IT Services are becoming such a big draw for businesses – not when cloud is attracting more and more focus, as organisations seek out the best, and most efficient and cost-effective means of storing their essential (and often highly sensitive) data.

One question I’m asked time and again, though, is how fast is the move into the Cloud? You hear all sorts of stats and claims, so it’s time to put a bit of reality around this. If you look at our own latest in-depth survey on this here at Symantec – ‘Avoiding The Hidden Costs of the Cloud’ – it’s clear that customers really are rushing to leverage cloud services, as they extend the reach of their IT deep into the stratosphere. In fact, more than 90% of all organisations are at least discussing Cloud – a sharp...

Symantec Analyst Relations | 14 May 2013 | 0 comments

This Blog was originally posted on In the Personal Cloud

Last November, we announced the beta version of Norton Zone, a new cloud file sharing service that allows users to safely and easily share the content that matters most. Today, I’m very pleased to announce Norton Zone is out of beta – stronger, faster and easier to use than ever. Also beginning today, users in the United States can buy additional storage, to expand the 5GB they continue to get for free.

The staggering growth of cloud services, mobile devices, and the social imperative to share anything is creating unique challenges. Almost all facets of our daily lives are “going digital,” and content is being created and shared in...

Robert Mol | 12 May 2013 | 0 comments

 

Creating competitive advantage by realising customers’ unmet and under-served needs is the goal of any progressive business. But you cannot achieve that in any meaningful way, unless you have a strategy that turns those customers into long-term, loyal and committed ones. In other words, believers in the solutions you design and offer them.

It is these principles that Symantec adheres to and has embraced in its 2013 Strategic Direction Plan, focused on three critical areas also defined as the 'Peaks' against which 'right for the customer' offerings are designed:

  • User Productivity & Protection
  • Information Security
  • Information Management: Availability & Scalability.

Importantly, this strategy has not emerged from any ‘deep bunker’ thinking, but from constant engagement with, and feedback from, customers and partners on precisely why they have opted for Symantec’s solutions...

Sian John | 02 May 2013 | 0 comments

A few weeks ago, online tech news site The Verge reported a security hole with Apple’s password reset software. All you needed to reset an Apple Id, it said, was a valid email address and date of birth. In this day and age, with personal details proliferating across the Web, it’s not hard to imagine how to get hold of either. 

The shame, perhaps, for Apple, is that the company was in the middle of implementing two-factor authentication for its mobile devices. To add insult to injury the registration process was three days, leaving anyone concerned about the security hole vulnerable to attack. 

On the upside, the breach has now been closed – it is no longer so easy to hack an Apple Id. However the situation does paint a stark picture of the state of play today, which brings together a...

Symantec Analyst Relations | 24 Apr 2013 | 0 comments

2013 Internet Security Threat Report, Volume 18

The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.

Key Findings

  • 42% increase in targeted attacks in 2012.
  • 31% of all targeted attacks aimed at businesses with less than 250 employees.
  • One waterhole attack infected 500 organizations in a single day.
  • 14 zero-day vulnerabilities.
  • 32% of all mobile threats steal information.
  • A single threat infected 600,000 Macs in 2012.
  • Spam volume continued to decrease, with 69% of all email being spam.
  • The number of phishing sites spoofing social networking sites increased 125%.
  • Web-based attacks increased 30%.
  • 5,291 new...
Jon C | 13 Apr 2013 | 0 comments

A couple of weeks ago, Google announced it would be canning its Google Reader service. Not a particularly strategic tool you might think - it simply enabled users to collate and organise feeds from news, blog and other content sites.

For those still using the product however, this is a problem. Google Reader offers a window onto the world of web content, and its removal is tantamount to walking into someone's house and removing their TV set. Or the calendar from the wall. Or, in the corporate environment, a library shelf full of books and newspapers. You get the picture.

Plenty of Google Reader users exist - as illustrated by the Change.org petition (LINK: http://www.change.org/petitions/google-keep-google...) which is currently running at nearly 150,000 responses. Clearly, if anyone thought that...

D Thomson | 26 Mar 2013 | 0 comments

 

Sometimes when we stop and think about how the world is changing, we realise that it already has.

From Symantec’s perspective, as we have learned from our many conversations with customers large and small, nowhere is this more apparent than in IT service delivery.
 
Delivering IT services was never simple, but at least it was linear. Traditional IT departments follow a command-and-control approach: strategy, procurement and related decisions have been made centrally and delivered out to business departments. This model is changing however, driven by factors coming across from business departments and up from the individuals that staff them.
 
Business divisions are unquestionably taking more control over the technologies they depend upon. What we used to know as “shadow IT” – procurements taking place without the knowledge of IT – is emerging from the gloom ...